The hospital is unable to access data from old devices on the network, officials said. As a result, the hospital is working to replace computer hard drives to provide clean access to its Meditech electronic health record.

Further, the hospital placed several new computers in strategic locations beginning Wednesday night, to provide staff with basic patient information from its EHR, including patient medical history, allergies, current medications and other patient data.

And it appears the hospital will have to replace its entire network: “We anticipate that within a few days, we will have significant functionality returned throughout the organization. This will be accomplished by building an entirely new network and by replacing all hard drives on all devices.”

Despite these disruptions, Princeton Community is continuing to provide all inpatient, outpatient, surgical, diagnostics, lab and radiology services.

However, the hospital is experiencing delays in processing information for radiology of non-emergency patients. Officials said those services have been deferred and or spread out across the organization.

Princeton Community is the second hospital system in the U.S. hit by the virus.

Pennsylvania-based Heritage Valley Health System's network was also hit with the attack, officials told CBS Pittsburgh. The incident is spread throughout the $480 network, including satellite and community locations.

Nuance Communications, a major provider of voice and language tools and biopharma giant Merck were also hit. Currently, there have been more than 2,000 infections throughout 64 countries, with Ukraine hit the hardest.

Meanwhile, more security experts have confirmed: NotPetya/Petya is not ransomware, but rather a wiper virus bent on destruction. Princeton Community’s decision to replace its systems is likely the only way to regain normal function of its computers.

The goal of the virus is to damage and destruct data. As NotPetya/Petya is a wiper: it excludes restoration capabilities.

NotPetya hackers didn’t employ a command-and-control server like standard ransomware strains. Instead, Kaspersky Labs researchers said the hackers use the infection identification to store the data from each infected computer and the decryption key. Further, the generated key appears to be fake.